Chapter 2 - Overview of the Bill

Chapter 2 - Overview of the Bill

Background

2.1       The purpose of the Telecommunications (Interception) Amendment Bill 2006 (the bill) is to amend the Telecommunications (Interception) Act 1979 (the Act) to implement certain recommendations of the Report of the Review of the Regulation of Access to Communications (the Blunn Report).

2.2       A major feature of the bill concerns lawful access to stored communications. There have been previous attempts to amend the Act to achieve this. They include provisions in the Telecommunications Interception Legislation Amendment Bill 2002 which proposed access to stored communications without the requirement for a telecommunications interception warrant. These provisions were withdrawn following a recommendation from the Committee that 'an interception warrant should be required for access to such communications.'[1]

2.3       Again, in February 2004, the Telecommunications (Interception) Amendment Bill 2004 provided that a telecommunications interception warrant would be required to obtain access to material which had not been retrieved by the intended recipient. A Committee inquiry found that that Bill was unclear about access to stored communications. The inquiry also revealed a disagreement between the Attorney-General's Department and the AFP as to the state of the existing legislation in relation to stored communications. The Committee recommended that Parliamentary consideration of the proposed subsections dealing with stored communications be deferred until the disagreement was resolved and Parliament was informed of the outcome.

2.4       A further amendment proposal in 2004, (the Telecommunications (Interception) Amendment (Stored Communications) Act 2004) provided an interim access regime for stored communications pending the outcome of the Blunn Report. The amendments were to expire on 14 December 2005, but on 14 September 2005, were further extended until 14 June 2006, to allow time for the Government to fully consider the recommendations from the Blunn Report.

Overview of the Bill

Schedule 1: Stored communications

2.5       The stored communications amendments prohibit access to stored communications held by a telecommunications carrier, subject to certain limitations.

Access to stored communications

2.6       The bill introduces a warrant regime for enforcement agencies to retrieve stored communications held by a carrier. The amendments regulate the use, communication and recording of information obtained by access to stored communications and require the enforcement agencies to report to the Minister regarding the use of the stored communications powers.

Applications for warrant

2.7       Warrants are only available to an enforcement agency which is investigating an offence punishable by a maximum period of imprisonment of three years or a pecuniary penalty of at least 180 penalty units ($19,800).

2.8       The existing interception warrant applications are limited to law enforcement agencies such as the AFP and the Australian Crime Commission. However, the bill proposals also permit applications to be made by all agencies responsible for administering a law imposing a pecuniary penalty or administration of a law relating to the protection of the public revenue. This includes the Australian Customs Service, the Australian Tax Office, and the Australian Securities and Investments Commission. Similar State and Territory agencies are also included.

Issue of warrants

2.9       Warrants are issued by an issuing authority appointed by the Minister and may include Judges of Courts exercising Federal jurisdiction, a Federal Magistrate, or a magistrate. The appointment is contingent upon the nominated person accepting the appointment in writing. The Minister may also appoint Members of the AAT who are legal practitioners of at least 5 years' standing.

Definition of stored communications

2.10      The proposed definition of stored communication (item 1) provides that a stored communication is a communication that, among other things, is held on equipment operated by the carrier at its premises. The explanatory memorandum states that:

This is to ensure that, ..., the stored communications regime only applies to accessing stored communications via a telecommunications carrier. The regime does not affect existing lawful access to communications stored on a person's telecommunication device.

Use of information obtained under a stored communications warrant

2.11      The use or communication of information which is obtained from stored communications will be limited to matters connected with investigating an offence which is punishable by a maximum period of imprisonment of one year, or a pecuniary penalty of at least 60 penalty units.

Schedule 2: Access to communications from third parties

2.12      Schedule 2 provisions enable agencies to obtain an interception warrant for communications of an associate of a person of interest. These have been called the 'B Party' interception warrants.

Application for and issue of warrants

2.13      The warrant may only be issued where the investigation involves serious offences that attract a maximum penalty of seven years imprisonment. The provision also requires the issuing authority to be satisfied that:

2.14      When issuing the warrant, the issuing authority must also have regard to the following:

2.15      The warrant applications are accompanied by an affidavit, sworn by the representative of the applicant agency. These are provided for half the time of existing interception warrants – 45 days for law enforcement authorities and 3 months for ASIO warrants.

Schedule 3: interception of telecommunications services on the basis of a telecommunications device

2.16      The existing TI warrants are 'named person warrants'. These amendments are 'equipment-based' rather than attaching to the person who is recorded as the owner of the service. This will allow access to mobile phone text messages, as well as voice messages.

2.17      The issuing authority must only issue a warrant under this part unless satisfied that the applicant agency 'has no practicable methods of identifying the telecommunications services used or likely to be used by the person of interest, or that interception of those services would not be possible'.[2]

2.18      The Explanatory Memorandum to the bill notes that this covers instances in which agencies may be able to identify all services, but it is impracticable to intercept each service. The example given is the person who uses multiple SIM cards to evade interception.

Schedule 4: Removal of references to Class 1 and Class 2 offences

2.19      The interception regime has until now authorised interception on the basis of classes of offences. In the past only Class 2 offences required the issuing authority to have regard to privacy considerations. The offence distinctions have been removed and the offences are now termed 'serious offences'. Serious offences are defined in the new section 5D, and include murder or similar offences, kidnapping, offences under Division 307 of the Criminal Code (these include importation and possession of certain drugs and plants) terrorism offences, offences against Division 72, 101, 102 or 103 of the Criminal Code (terrorism offences); or an offence in relation to which the ACC is conducting a special investigation.

2.20      The privacy considerations now apply to all interception warrants.

Schedule 5: Transfer of functions

2.21      The Schedule changes the arrangements concerning the Telecommunications Interception Remote Authority Connection, an electronic system which requires the interception agency to lodge its interception warrants with the AFP. The Explanatory Memorandum to the bill indicates that the system has outlived its usefulness, and is to be discontinued.

2.22      The effect of this will be to allow warrants once issued to be executable immediately, rather than having to wait for them to be registered with the AFP. Registers will be kept by the Secretary of the Attorney General's Department who will receive and review warrants on issue.

Schedule 6

2.23      These provisions are largely consequential, and provide for specific state application where necessary. In addition, the use of interception powers by security and law enforcement agencies continues to be subject to strict reporting, disclosure and destruction provisions of the Act.

Navigation: Previous Page | Contents | Next Page